Skip to content

[Feature]: Redact sensitive information from responses, logs, and auth events unless explicitly requested for development flows. #27

@Bccorb

Description

@Bccorb

Problem statement

There should NEVER be any information placed in the logs, even in development unless a developer explicitly says so.

Proposed solution

  • OTPs, magic-link tokens, provider tokens, refresh tokens, secret material, and private keys are redacted by default.
  • Development-only raw payload access requires an explicit opt-in.
  • Logs and auth events use redaction helpers.
  • Tests catch representative accidental leakage paths.

Alternatives considered

No response

Impact area

Security

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions